On Wed, Jun 15, 2011 at 10:41 AM, Roger Dingledine wrote:
> On Wed, Jun 15, 2011 at 08:44:24AM +0800, Fernan Bolando wrote:
>> Please note my original intent with I started this thread was to
>> create a base set of rules for my users to follow to maximimize tor
>> anonymity and not become a tool
On Wed, Jun 15, 2011 at 08:44:24AM +0800, Fernan Bolando wrote:
> Please note my original intent with I started this thread was to
> create a base set of rules for my users to follow to maximimize tor
> anonymity and not become a tool against anonymity.
Which ones are 'your' users (so I can figure
On Wed, Jun 15, 2011 at 6:33 AM, Joe Btfsplk wrote:
> On 6/12/2011 1:22 AM, Seth David Schoen wrote:
>>
>> Your communication with an online banking site usually _would_ be
>> encrypted with HTTPS, which would encrypt your login password. For
>> instance, if you were banking with Bank of America,
On 6/12/2011 1:22 AM, Seth David Schoen wrote:
Your communication with an online banking site usually _would_ be
encrypted with HTTPS, which would encrypt your login password. For
instance, if you were banking with Bank of America, you would normally
start your login process at
https://www.ban
Joe Btfsplk writes:
> I'm not a guru in this dept - only what I've read. Reason usually
> given not to use Tor for Banking is because the Tor exit node has to
> send unencrypted data to your target site (like bank PWs). Unless
> your communication w/ that site was somehow encrypted (& a login PW
I'm not a guru in this dept - only what I've read. Reason usually given
not to use Tor for Banking is because the Tor exit node has to send
unencrypted data to your target site (like bank PWs). Unless your
communication w/ that site was somehow encrypted (& a login PW wouldn't
be). A malicio
Hi all
I have seen posts on various websites giving a general rules on when
and when not to use tor. I have seen, however any official
documentation on from torproject or any of the privacy
website like eff. Does such a documentation exists? can somebody point me to it.
examples
dont use tor in b